How the Daily Express accidentally DDoS’ed a small Limerick based design agency (again!*)

This is a follow up from “DNS is the backbone of the internet, get it wrong and it can cause serious problems - just look at the Daily Express website”. On Tuesday this week I visited the Daily Express by typing in it’s address manually not using a search engine. A search engine would take you to but enter it manually and you go to

As covered last time the www A record sends you to and the @ A record sends you to On entering on Tuesday I ended up at Both Blue Chief and the newspaper use Dublin. AWS for their hosting. I tweeted to Blue Chief and The Daily Express, and emailed The Daily Express on the same day of discovering the issue.

By The Daily Express entering not, end users typing in ended up at Blue Chief’s website not A simple mistake with bad consequences. for likely 24 hours received a fair chunk of’s web traffic hence overloading their website for the time period.

The Daily Express has not replied yet to the email nor the form submission, but Shannon of Blue Chief did…

It turns out getting free traffic intended for a major UK tabloid has its cons. Another thought is, can you actually protect against this type of “DDoS” attack since the traffic is from genuine users just hitting the wrong website?/! The answer might be with difficulty since they are normal home users manually going to a website not controlled as part of a botnet or using a special malicious tool.

The moral of the story? Manage your DNS records properly and monitor your website for errors!

*The first time (I spotted this) was Manga High in September.